1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudik [331]
4 years ago
9

Julie is trying to decide weather or not to add a color scheme to her presentation and she asks you for your advice u should adv

ise her that color schemes
Computers and Technology
1 answer:
otez555 [7]4 years ago
6 0
Of course you should!!!! I am considered the tech guy at my school. Go for it. 
You might be interested in
In what type of attack does the attacker send unauthorized commands directly to a database?
Delvig [45]
SQL injection. This is usually cause by the programmer not making the program parse incoming text, therefore allowing an attacker to input database commands.
4 0
4 years ago
Write an algorithm which gets a number N, and prints all the natural numbers less than or equal N. 3.
oksian1 [2.3K]

Answer:

Algorithm:

1.Create a variable N.

2.Read the value of N from user.

3.for i=1 to N.

 3.1 Print value of i.

4.end program.

Implementation in C++:

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variable

int N;

cout<<"Enter value of N:";

// read the value of N

cin>>N;

cout<<"Natural number from 1 to "<<N<<" are:";

for(int i=1;i<=N;i++)

{

// print the numbers

   cout<<i<<" ";

}

return 0;

}

Output:

Enter value of N:6                                                                                                        

Natural number from 1 to 6 are:1 2 3 4 5 6

3 0
3 years ago
Which of the following statements are true regarding Zyvox? (Select ALL that apply.)
Alinara [238K]

Answer: A,C,E

Zyvox = linezolid

Explanation:

Zyvox posses an excellent Gram positive coverage, as well as MRSA and VRE. Zyvox is primarily cleaned by the liver, the MAO inhibitor is expected to be administered with care along with Scrotonergic agents like SSRI, antidepressants, and it must be well monitored.

Bone marrow suppression is toxicity related with time and not Nephrotoxicity. Bioavailability in Zyvox is very excellent ; with transition from IV.PO with a ratio of 1:1.

7 0
4 years ago
Which of the following correctly declares an array:
AleksandrR [38]

Answer:

a.

Explanation:

6 0
3 years ago
MDM consolidates data from various data sources into a __________, which then feeds data back to the applications, thereby creat
Pepsi [2]

Answer:b) Master reference file(MRF)

Explanation: Master reference file is the collection of data that persist the schedules records for the maintenance and administration. It is the UDC version tool .

It helps in the managing the data content present in the database, archiving and tracing any changes on the database over certain time.Master data management is the managing of data's integrity .It  send the collected critical data to the master reference files.

Other given options are incorrect because backup file is for creating data backup, central directory is record of the data of users and other information and data silo is kind of fixed data having the governance of any organization.Thus, these factors don't help in the critical information management.Thus, the correct option is option(b).

3 0
4 years ago
Other questions:
  • Cameron wants to impress the owner of the company. He creates a graph that shows the improved productivity at the company over t
    13·2 answers
  • You need to control the number of people who can be in an oyster bar at the same time. Groups of people can always leave the bar
    12·1 answer
  • Most network cards contain a port that accepts a(n) ____, which looks similar to a telephone connector but is larger.
    14·1 answer
  • Which education level has the highest return on investment (ROI)?
    14·1 answer
  • Why would a designer choose to use an isometric sketch rather than a perspective sketch to share their idea with a design team m
    14·1 answer
  • Peter wants to protect a confidential document by using a password. He wants to use an asterisk and an ampersand symbol in his p
    10·1 answer
  • Write a program that prompts the user to enter a Social Security number in the format ddd-dd-dddd, where d is a digit. The progr
    12·1 answer
  • A(n) ____ is system software. Group of answer choices word processing program presentation graphics program operating system spr
    6·1 answer
  • What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
    15·1 answer
  • are there any hexadecimal digits that cannot be created using 4 bits? how many bits would you need to represent the hexadecimal
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!